Research projects:

 

 MAIDAM in IoT/Fog/Cloud – Mutual Authentication, Intrusion Detection and Autonomic Management in IoT/Fog/Cloud Environments and  AutoManSec 4 CloudIoT – Autonomic Management and Security for Cloud and IoT

 

Some results:

HyVAW: A hybrid vulnerability analysis workflow threat model methodology for complex systems based on distributed components

 

Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review

 

Detecting attacks in Fog and cloud computing environments using Deep Learning: A systematic literature review

 

Intensive care unit nursing workload estimation in smart hospitals

Distributed AgriFood Supply Chains

 

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments

 

Performance of security options for message protocols: A comparative analysis

 

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

 

DNNET-Ensemble approach to detecting and identifying attacks in IoT environments

 

Intrusion detection with Machine Learning in Internet of Things and Fog Computing: problems, solutions and research

 

Intrusion_detection_and_prevention_in_fog_based_IoT_environments_A_systematic_literature_review

 

Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments

 

Autonomic energy management with Fog Computing

 

Mutual authentication with multi-factor in IoT-Fog-Cloud environment

 

Hybrid approach to intrusion detection in fog-based IoT environments

 

Autonomic Intrusion Detection and Response Using Big Data

 

Order@Cloud: An agnostic metaheuristic for VM provisioning, adaptation, and organisation

 

Mutual Authentication for IoT in the Context of Fog Computing

 

Privacy Policies Model in Access Control

 

Cloud identity management: a survey on privacy strategies 

 

Improving cloud computing virtual machines balancing through hosts and virtual machines similarities 

 

Preserving Privacy with Fine-grained Authorization in an Identity Management System 

 

A Framework and Risk Assessment Approaches for Risk-based Access Control in the Cloud 

 

Order@Cloud: A VM Organisation Framework Based on Multi-Objectives Placement Ranking

 

A Model for Managed Elements under Autonomic Cloud Computing Management

 

A distributed autonomic management framework for cloud computing orchestration

 

RACLOUDS – Model for Clouds Risk Analysis in the Information Assets Context

 

Cloud resource management: a survey on forecasting and profiling models 

 

Legacy Network Infrastructure Management Model for Green Cloud Validated Through Simulations

 

Operation, Management, Security and Sustainability for Cloud Computing 

 

Green Clouds through Servers, Virtual Machines and Network Infrastructure Management 

 

 Provisioning, Resource Allocation, and DVFS in Green Clouds

 

 Environment, Services and Network Management for Green Clouds

 

”Toward an Architecture for Monitoring Private Clouds” 

 

“Intrusion Detection for Grid and Cloud Computing”